Understanding the use of passwords
Computers and Security
Cryptography: an introduction to computer security
Cryptography: an introduction to computer security
Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer (2nd ed.)
IEEE Spectrum
Security in computing
Password authentication with insecure communication
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
A high security log-in procedure
Communications of the ACM
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
A secure dynamic ID based remote user authentication scheme for multi-server environment
Computer Standards & Interfaces
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Cryptanalysis to a remote user authentication scheme using smart cards for multi-server environment
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment
International Journal of Electronic Security and Digital Forensics
Future Generation Computer Systems
The Journal of Supercomputing
Hi-index | 0.00 |
Due to the rapid progress of information technology, computer systems with the client/server architecture have been becoming a new way in multi-user computing environments. For the environment of single server, the issue of remote login authentication has already been solved by a variety of schemes, but it has not been efficiently solved for multi-server Internet environments yet. In this paper, we will present an efficient smart card based remote login authentication scheme for multi-server Internet environments, which can verify a single password for logining multiple authorized servers without using any password verification table. The objective of the new scheme emphasizes that any client can get service grant from multiple servers without repetitive registration to each server. The proposed scheme's advantages include that not only repetitive registration for various servers is avoided, but also the network users can freely choose their preferred passwords and be deleted easily by the system. Moreover, security analyses about the impersonation and replay attacks on the proposed scheme validate the feasibility of the scheme.